Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Glance Features to Know: Making Human Connections in the Digital World Jill Newberg, Director of Product Marketing at Glance, Matt Wheeler, Sales Engineer at Glance Whether you’re new to Glance or a long-time customer, the latest features offer new ways for you to connect, share, and secure personalized, guided cu... 1 month ago | 31 mins What's New in Test Data Manager 4.10? Abhijit Mugali, Krishna Prasad Ande, Mark Asbury, and Abderrahmane Zahrir Join Broadcom Software leaders as they discuss What's New in Test Data Manager 4.10 including: • Enterprise Masking Configuration Deployment • Secure ... 2 months ago | 66 mins How to Use Data Masking to Protect Sensitive Data in Your DevOps Pipelines Tali Einhorn, Product Manager & Hod Rotem, VP Solution Engineering at K2View Data masking is critical for data-driven businesses that must comply with a growing number of data protection laws, and safeguard against ever-increas... 7 months ago | 51 mins De-identifying Cloud Data Pipelines: Approaches, Best Practices, and Learnings Ameesh Divatia, CEO, Baffle and Syl Yelle, Head of Sales, Baffle Cloud-based data lakes and data stores provide tremendous business value for next-gen analytics, machine learning and artificial intelligence, as well... 3 months ago | 44 mins MIGRER VERS LE CLOUD EN TOUTE CONFIANCE AVEC ENTRUST ET MICROFOCUS VOLTAGE Jérôme Béclin - Entrust, José Antonio Sanchez - Microfocus Voltage AVEC ENTRUST ET MICRO FOCUS VOLTAGE 41% des entreprises françaises migrent actuellement leurs données vers le cloud, ce taux représente le plus bas d... 3 months ago | 52 mins Understanding Data Masking in Healthcare Jeannine Crownover and Sharon Bell, Principal Product Marketing Manager from Delphix, and Steve Sideris from SourceEdge Learn how to overcome the complexities of de-identifying TriZetto® healthcare data and healthcare EDI files to protect PII/PHI data. Over two dozen C... 10 months ago | 41 mins Protect Sensitive Data (and be PCI Compliant, too!) Kevin Poniatowski, Principal Security Instructor, Security Innovation Sensitive data is vulnerable when it is stored insecurely and transmitted over open networks. The PCI Security Standards Council is the authority on p... 5 months ago | 59 mins The Era of Data Protection Method Choice is Finally Here Raul Ortega It's your data. Much of it is not sensitive, and therefore can be in the clear. But sensitivity is a spectrum, and some data is more sensitive than ot... 1 year ago | 46 mins Protect Sensitive Data (and be PCI Compliant, too!) Kevin Poniatowski, Principal Security Instructor, Security Innovation Sensitive data is vulnerable when it is stored insecurely and transmitted over open networks. The PCI Security Standards Council is the authority on p... 4 months ago | 59 mins Protect Sensitive Data (and be PCI Compliant, too!) Kevin Poniatowski, Principal Security Instructor, Security Innovation Sensitive data is vulnerable when it is stored insecurely and transmitted over open networks. The PCI Security Standards Council is the authority on p... 4 months ago | 59 mins Load more